Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Broken Arrow (Score 5, Informative) 107

Lost nuclear bombs are also called "Broken Arrow".

>the US Department of Defense has officially recognized 32 "Broken Arrow" incidents, including but not limited to
        1950 British Columbia B-36 crash
        1956 B-47 disappearance
        1958 Mars Bluff B-47 nuclear weapon loss incident
        1958 Tybee Island mid-air collision
        1961 Yuba City B-52 crash
        1961 Goldsboro B-52 crash
        1964 Savage Mountain B-52 crash
        1965 Philippine Sea A-4 incident
        1966 Palomares B-52 crash[6]
        1968 Thule Air Base B-52 crash
        1980 Damascus, Arkansas incident

Comment Even some x86 CPUs contain ARM (Score 2) 65

AMD's new x86 Zen CPUs contain an ARM based coprocessor.

Zen added the support for AMD's Secure Memory Encryption (SME) and AMD's Secure Encrypted Virtualization (SEV). Secure Memory Encryption is real time memory encryption done per page table entry. This is done utilizing the onboard "Security" Processor (ARM Cortex-A5) at boot time to encrypt each page, allowing any DDR-4 memory (including nonvolatile varieties) to be encrypted. AMD SME also makes the contents of the memory more resistant to memory snooping and cold boot attacks.

Then there are the new ARM-based Opterons.

Comment Real meaning of SMART (Score 1) 82

The hidden meaning of "smart" in "smart phone" and "smart light switch" actually implies something different, taken from the hard drive industry:

Self-Monitoring, Analysis and Reporting Technology (SMART)

The purpose of these devices seems to be total monitoring of its users. A "smart" home usually means the vendor knows the state of every light switch, every door sensor, every movement down to the millisecond. I'm just waiting for a group of burglars to break into such a database to determine when and where to break into houses.

Comment Windows Phone? (Score 3, Insightful) 237

If you run Windows Phone or Windows 10 you should say goodbye to any sort of privacy.

As of now there are no commercially available smart phones that respect your freedom entirely. Depending on where you draw the line,
your best bets are Replicant or at the very least CyanogenMod without any Google Apps.

F-Droid is a package manager for Android that only contains software that respects your freedom.

Comment Re:HTML5: the stealth OS specification (Score 1) 88

Sorry, didn't mean to put you on the defensive. You're doing that because your web browser does it. You didn't want to run some random application, but you did, at some point, load a web page which contained a script tag that shouldn't have been there. You say "but it's just a web browser!" and I'm explaining, "No, it's an Operating System." Eww.

You have a very good point and the user really is responsible for what they run in the end.
I should use Tor Browser more often, which is less chatty. Someone ought to make a fork of Tor Browser without Tor. It really is superior to any other browser in that regard.

Slashdot Top Deals

"When the going gets tough, the tough get empirical." -- Jon Carroll